getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software with Access Controls/Permissions (2026) - Page 6

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


179 software options

NACVIEW logo

Network access control solution

learn more
NACVIEW is a network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network type of device, operating system, and more.

Read more about NACVIEW

Users also considered
Ivanti Security Controls logo

Automated patch management & application control

learn more
Ivanti Security Controls streamlines security with unified, automated techniques against major attack vectors. It offers patch management and application control, allowing organizations to find, inventory, and patch servers, VMs, and templates, regardless of power or network status.

Read more about Ivanti Security Controls

Users also considered
VMware NSX logo

Network Virtualization Platform

learn more
VMware NSX is a flexible and agile software-defined Network Virtualization Platform.

Read more about VMware NSX

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
Detectify logo

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
ThreatSTOP DNS Defense logo

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
Cisco Identity Services Engine logo

Services Engline for improved & dynamic network visibility

learn more
Identity Services Engine (ISE) provides visibility into network devices on a zero-trust framework. It builds visibility based-segmentation, offers dynamic and complete visbility.

Read more about Cisco Identity Services Engine

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / NTA monitors inbound and outbound flows (as well as lateral movements) within a given perimeter to detect intrusions.
With a database of over 60,000 qualified rules, XDR / NTA detects abnormal traffic activity 24/7 using networks signatures analysis and behavioral analysis.

Read more about TEHTRIS XDR Platform

Users also considered
SpyHunter logo

Malware detection and removal software for Windows and Mac

learn more
SpyHunter is an on-premise malware detection and removal tool for Windows and Mac designed to help businesses scan, identify, remove, and block potentially unwanted programs (PUPs) and malware. It lets users protect their system against the latest malware threats by removing ransomware, trojans, viruses, worms, adware, rootkits, and other objects.

Read more about SpyHunter

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome offers a comprehensive network security solution with encrypted connections, dedicated IPs, and device posture checks. Its 24/7 support and seamless integration help businesses efficiently manage access permissions and fortify against cyber threats.

Read more about PureDome

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra safeguards networks with high-performance DDoS mitigation through cloud or on-premise scrubbing, ensuring clean and uninterrupted traffic.

Read more about Myra Security

Users also considered
ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
SecureONE logo

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
BhaiFi Core logo

Unified Software-Based Networking Platform Beyond Firewall.

learn more
All-In-One Software-Based Network Security & Management Solution for Coworking Spaces, SMEs, Hotels & Retail.

Read more about BhaiFi Core

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
Flowmon ADS logo

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon ADS

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
INETCO Insight logo

Transaction monitoring solution

learn more
INETCO Insight is an independent real-time payment network intelligence platform designed to meet the specific needs of the payments industry, including banking, retail and payments industries.

Read more about INETCO Insight

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
TokenEx is cloud-based data security, key and encryption management platform designed to help small to large businesses with tokenization, compliance regulations and cloud vaulting to protect sensitive data such as PII, PCI, PHI, and even information in unstructured formats.

Read more about TokenEx

Users also considered
VGS logo

Secure collection, protection & exchange of sensitive data

learn more
VGS platform by Very Good Security enables users to securely collect, protect, and exchange sensitive data such as card details, personal finance data, identification documents, vacation rental payments, & credentials, using data redaction and alias value systems which cannot be reverse engineered

Read more about VGS

Users also considered